Teraoka, Fumio

写真a

Affiliation

Faculty of Science and Technology, Department of Information and Computer Science (Yagami)

Position

Professor

Related Websites

External Links

Career 【 Display / hide

  • 1984.04
    -
    1988.02

    キヤノン株式会社

  • 1988.04
    -
    2001.03

    株式会社ソニーコンピュータサイエンス研究所

  • 2001.04
    -
    Present

    大学教授(理工学部情報工学科)

  • 2001.10
    -
    2007.09

    理工学インフォメーションテクノロジーセンター所長

  • 2002.10
    -
    2003.09

    大学学生総合センター委員(矢上支部)

display all >>

Academic Background 【 Display / hide

  • 1982.03

    Keio University, Faculty of Engineering

    University, Graduated

  • 1984.03

    Keio University, Graduate School, Division of Engineering

    Graduate School, Completed, Master's course

Academic Degrees 【 Display / hide

  • 工学, Keio University, Dissertation, 1993.03

    A Study on Host Mobility in Wide Area Computer Networks

 

Research Areas 【 Display / hide

  • Informatics / Information network

Research Keywords 【 Display / hide

  • Internet, Distributed Systems

Research Themes 【 Display / hide

  • New Generation Network Architecture, 

    2007
    -
    Present

 

Books 【 Display / hide

  • Wireless IP and Building the Mobile Internet

    TERAOKA FUMIO, Artech House Publishers, 2003.01

    Scope: 415-439

  • ワイヤレスLANアーキテクチャ

    TERAOKA FUMIO, 共立出版, 1996.06

    Scope: 73-108

Papers 【 Display / hide

  • LiONv2: An Experimental Network Construction Tool Considering Disaggregation of Network Configuration and Device Configuration

    Nagai Y., Watanabe H., Kondo T., Teraoka F.

    Proceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age, NetSoft 2021 (Proceedings of the 2021 IEEE Conference on Network Softwarization: Accelerating Network Softwarization in the Cognitive Age, NetSoft 2021)     171 - 175 2021.06

     View Summary

    An experimental network environment plays an important role to examine new systems and protocols. We have developed an experimental network construction tool called LiONv1 (Lightweight On-Demand Networking, ver.1). LiONv1 satisfies the following four requirements: programmer-friendly configuration file based on Infrastructure as Code, multiple virtualization technologies for virtual nodes, physical topology conscious virtual node placement, and L3 protocol agnostic virtual networks. None of existing experimental network environments satisfy all the four requirements. In this paper, we develop LiONv2 which satisfies three more requirements: diversity of available network devices, Internet-scale deployment, and disaggregation of network configuration and device configuration. LiONv2 employs NETCONF and YANG to achieve diversity of available network devices and Internet-scale deployment. LiONv2 also defines two YANG models which disaggregate network configuration and device configuration. LiONv2 is implemented in Go and C languages with public libraries for Go. Measurement results show that construction time of a virtual network is irrelevant to the number of virtual nodes if a single virtual node is created per physical node.

  • Nishikaze: Self-Sustained Wind Power Supply Employing Potential Energy Conversion Method

    Teraoka F., Nishiura S., Ohno H.

    ACM International Conference Proceeding Series (ACM International Conference Proceeding Series)     151 - 156 2021.01

    ISSN  9781450381840

     View Summary

    In an IoT (Internet of Things) system, if image data can be collected in addition to sensor data, the amount of information obtained will increase significantly, which is very useful for monitoring natural disasters, for example. Considering communication speed and covering range, it is assumed that Wi-Fi multi-hop communication is appropriate for image data transmission. Since Wi-Fi consumes a large amount of power, a power supply for sensor nodes is required. Therefore, we are developing a self-sustaining wind power supply called Nishikaze which employs the potential energy conversion method. In this paper, we produced the Nishikaze second prototype. The measurement results of the amount of the generated power show that the Nishikaze second prototype can cover the power required to transmit an image of 500 kbytes at a 10 minute interval assuming that 3 m/s of wind blows for 6 hours in a day, 100 % of the generated power is available, and the active period of sensor nodes is 5 seconds.

  • Management and network orchestration for edge/fog-based distributed data processing

    Watanabe H., Hayashi K., Sato T., Kondo T., Teraoka F.

    Journal of Information Processing (Journal of Information Processing)  29   640 - 648 2021

    ISSN  03875806

     View Summary

    In the age of edge/fog computing, it is important to consider not only computing resources but also network resources when hosting services. Since service is composed of multiple small functions in the microservice architecture, we treat a service as a set of BFs (basic functions) that fulfill a single task. It is required to place BFs at edge/fog nodes considering the computing resources and network requirements within a practical time. This paper proposes a MANO (Management and Network Orchestration) for deploying services composed of multiple BFs with requirements to computing and network resources of distributed nodes. The proposed MANO considers the computing resources of edge/fog/cloud as well as the network delay and the bandwidth between them. This paper proposes an optimal method and a heuristic method for calculating the placement of BFs. The evaluation results show that the placement calculation time for a service composed of four BFs is about 10 seconds with the optimal method and about 20 seconds with the heuristic method. The calculation time is within the practical range.

  • GAMPAL: an anomaly detection mechanism for Internet backbone traffic by flow size prediction with LSTM-RNN

    Wakui T., Kondo T., Teraoka F.

    Annales des Telecommunications/Annals of Telecommunications (Annales des Telecommunications/Annals of Telecommunications)  77 ( 5-6 ) 437 - 454 2021

    ISSN  00034347

     View Summary

    This paper proposes a general-purpose anomaly detection mechanism for Internet backbone traffic named GAMPAL (General-purpose Anomaly detection Mechanism using Prefix Aggregate without Labeled data). GAMPAL does not require labeled data to achieve general-purpose anomaly detection. For scalability to the number of entries in the BGP RIB (Border Gateway Protocol Routing Information Base), GAMPAL introduces prefix aggregate. The BGP RIB entries are classified into prefix aggregates, each of which is identified with the first three AS (Autonomous System) numbers in the AS_PATH attribute. GAMPAL establishes a prediction model for traffic sizes based on past traffic sizes. It adopts a LSTM-RNN (Long Short-Term Memory Recurrent Neural Network) model that focuses on the periodicity of the Internet traffic patterns at a weekly scale. The validity of GAMPAL is evaluated using real traffic information, BGP RIBs exported from the WIDE backbone network (AS2500), a nationwide backbone network for research and educational organizations in Japan, and the dataset of an ISP (Internet Service Provider) in Spain. As a result, GAMPAL successfully detects anomalies such as increased traffic due to an event, DDoS (Distributed Denial of Service) attacks targeted at a stub organization, a connection failure, an SSH (Secure Shell) scan attack, and anomaly spam.

  • Efficient RPL Tree Construction Using Passive Link Quality Estimation

    Fujita H., Tanaka Y., Mori K., Teraoka F.

    Proceedings - 2021 9th International Symposium on Computing and Networking Workshops, CANDARW 2021 (Proceedings - 2021 9th International Symposium on Computing and Networking Workshops, CANDARW 2021)     8 - 14 2021

     View Summary

    For LLNs (Low power and Lossy Networks), RPL (IPv6 Routing Protocol for LLNs) has been standardized by the IETF (Internet Engineering Task Force) as a routing protocol for LLNs. In RPL, each node estimates the link quality to neighboring nodes and selects the parent node by the OF (Objective Function). As a result, a tree structure rooted at the sink is constructed. Existing OFs such as MRHOF (Minimum Rank with Hysteresis OF) adopt active monitoring for link quality estimation, i.e., each node periodically broadcasts control packets, which results in large control overhead. This paper proposes BROF (Broadcast Reception based OF) which employs passive monitoring for link quality estimation, i.e., each node estimates the link quality by the actual number of control packet receptions and the expected number of control packet receptions. This paper also evaluates the basic performance of BROF by comparing with MRHOF implemented in Contiki-NG, which is an OS (Operating System) for IoT devices. As a result, the number of parent node switching in BROF is 20% lower than that in MRHOF and the control overhead in BROF is 65% lower than that in MRHOF although the network construction time in BROF is 15% larger than that in MRHOF. Furthermore, the delay time of UDP packet transmission from each node to the sink in BROF is 1% smaller than that in MRHOF.

display all >>

Presentations 【 Display / hide

  • Constructing Network Slices with Locator/ID Split and Locator Division for 5G Core Network

    Kohei MatsuedaTakamasa OchiaiHiroaki TakanoRyota KimuraRyo SawaiTERAOKA FUMIO

    5th International Workshop on 5G Architecture (5GARCH) (Kansas City, MO, U.S.A.) , 

    2018.05

    Oral presentation (general), IEEE

  • MocLis: a Non-Tunneling Moving Cell Support Protocol Based on Locator/ID Split for 5G System

    Takamasa OchiaiKoei MatsuedaTakao KondoHiroaki TakanoRyota KimuraRyo SawaiTERAOKA FUMIO

    IEEE International Conference on Communications 2018 (ICC 2018) (Kansas City, MO, U.S.A.) , 

    2018.05

    IEEE

  • PTP Accuracy Measurement Comparison between Boundary Clock and VLAN Priority

    Koki HoritaShota ShiobaraTakao OkamawariFumio TeraokaKunitake Kaneko

    International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS 2017), 

    2017.09

    Oral presentation (general)

  • Separating Communication Policies and Mechanisms to Make Protocol Layering Clearer

    Hiroki WatanabeTakao KondoKunitake KanekoFumio Teraoka

    The 26th International Conference on Computer Communications and Networks (ICCCN 2017) (Vancouver, Canada) , 

    2017.07

    Oral presentation (general), IEEE

  • Layer-5 Temporally-Spliced Path for Efficient Disruption Tolerant Networking

    Daiki MitakeKunitake KanekoFumio Teraoka

    IEEE International Symposium on Local and Metropolitan Area Networks 2017 (LANMAN2017) (Osaka, Japan) , 

    2017.06

    Oral presentation (general), IEEE

display all >>

Intellectual Property Rights, etc. 【 Display / hide

  • ネットワーク構成検出装置、ネットワーク構成検出システム、ネットワーク構成検出方法及びネットワーク構成検出プログラム

    Date applied: 特願2017-136873  2017.07 

    Date announced: 特開2019-022007   

    Date issued: 特許 2017-136873(2017/07/13)  

    Patent, Joint

  • ストレージサーバ装置、ネットワーク情報共有システム、ネットワーク情報共有方法及びネットワーク情報共有プログラム

    Date applied: 特願2016-153376  2016.08 

    Date announced: 特開2018-023018  2018.02 

    Date issued: 特許 2016-153376(2016/08/04)  

    Patent, Joint

  • 通信装置、システム及び方法

    Date applied: 特願2015-148962  2015.07 

    Date announced: 特開2017-034305  2017.02 

    Date issued: 特許 2015-148962(2015/07/28)  

    Patent, Joint

  • 通信システム、通信制御方法、ノード装置及びプログラム

    Date applied: 特願2014-132479  2014.06 

    Date announced: 特開2016-12776  2016.01 

    Date issued:   2018.01

    Patent, Joint

  • 通信制御方法,通信システム,ノード装置,及びプログラム

    Date applied: 特願2013-115784  2013.05 

    Date announced: 特開2014-236321  2014.12 

    Date issued: 特許第5990492号  2016.08

    Patent, Joint

display all >>

Awards 【 Display / hide

  • 情報処理学会 平成12年度論文賞

    SHITAMA KAZUHIRO TERAOKA FUMIO, 2001.05, 情報処理学会, 移動指向ネットワークアーキテクチャの設計と実装

    Type of Award: Award from Japanese society, conference, symposium, etc.

  • 情報処理学会 平成12年度論文賞

    2001, 情報処理学会

  • 高橋奨励賞

    TERAOKA FUMIO, 1992.06, 日本ソフトウェア科学会, Virtual Internet Protocol の実装と評価

    Type of Award: Award from Japanese society, conference, symposium, etc.

  • 日本ソフトウェア科学会 高橋奨励賞

    1992, 日本ソフトウェア科学会

 

Courses Taught 【 Display / hide

  • SECURITY HANDS-ON 1

    2024

  • RECITATION IN INFORMATION AND COMPUTER SCIENCE

    2024

  • NETWORK ENGINEERING 1 B

    2024

  • NETWORK ENGINEERING 1 A

    2024

  • LITERACY IN INFORMATION SECURITY MANAGEMENT B

    2024

display all >>

Courses Previously Taught 【 Display / hide

  • UNIX System Programming

    Keio University

    2013.04
    -
    2014.03

    Autumn Semester, Lecture, Within own faculty, 1h

  • Advanced Course on Network Engineering

    Keio University

    2013.04
    -
    2014.03

    Spring Semester, Lecture, 1h

  • Network Engineering I

    Keio University

    2013.04
    -
    2014.03

    Spring Semester, Lecture, Within own faculty, 1h

 

Memberships in Academic Societies 【 Display / hide

  • 情報処理学会, 

    1995
    -
    Present
  • 日本ソフトウェア科学会, 

    1991
    -
    2017
  • 電子情報通信学会

     
  • ACM

     
  • IEEE

     

Committee Experiences 【 Display / hide

  • 2017

    第34回大会委員長, 日本ソフトウェア科学会

  • 2015

    Technical Program Co-Chair, Asian Internet Engineering Conference 2015 (AINTEC2015), ACM

  • 2014.05
    -
    Present

    IEICE Transactions on Communications編集委員, 電子情報通信学会

  • 2014

    Technical Program Co-Chair, Asian Internet Engineering Conference 2014 (AINTEC2014), ACM

  • 2013

    Editor-in-Chief, Special Section on Internet Architectures, Protocols, and Management Methods that Enable Sustainable Development, IEICE Transactions on Communications, The Institute of Electronics, Information and Communication Engineering (IEICE)

display all >>